joshterrill / node-reverse-trojanLinks
An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.
☆16Updated 10 years ago
Alternatives and similar repositories for node-reverse-trojan
Users that are interested in node-reverse-trojan are comparing it to the libraries listed below
Sorting:
- Xanity PHP RAT leak For Researchers☆22Updated 10 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Thanos is a tool made for scan a range of IP's and get the banners of the running services. The main function is do banner grabber, but y…☆45Updated 9 years ago
- The Horrific Omnipotent Rootkit☆23Updated 8 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆11Updated 10 years ago
- This version touches disk for registry persistence.☆26Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 9 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- uses keywords from alert logs to send SMS☆24Updated 10 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Updated 11 years ago
- a javascript keylogger included in a gif file☆39Updated 6 months ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Updated 14 years ago
- LD_PRELOAD rootkit☆24Updated 11 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 10 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆35Updated 12 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 7 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Updated 10 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated last year
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 10 years ago
- Network Guardian☆12Updated 8 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Tool to obtain information about IP or domain: Geolocation, network, whois and opened ports.☆17Updated 7 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆54Updated 4 years ago